Coming soon - Get a detailed view of why an account is flagged as spam!
view details

This post has been de-listed

It is no longer included in search results and normal feeds (front page, hot posts, subreddit posts, etc). It remains visible only via the author's post history.

3
Assess a mobile application developed with Flutte
Post Flair (click to view more posts with a particular flair)
Post Body

Hello,

I've been struggling for over four days to assess a mobile application developed with Flutter. It seems that the app is using a non-standard system proxy for its requests. I attempted to listen on all interfaces of the mobile emulator in Android Studio, but encountered some unusual behavior. Despite capturing traffic on various interfaces and experimenting with different APIs (27, 28, 29, 30, 34) with and without Google Play, I could only observe one request going to Supabase, which the app utilizes for its authentication mechanism. However, I couldn't detect their backend, even after thorough analysis. I've attached a picture containing a pcap file of intercepted packets on the mobile device. My intention is to configure iptables to redirect traffic to my Burp Suite on the local machine. Unfortunately, I couldn't find anything noteworthy containing HTTP/HTTPS requests on non-standard ports. If anyone has attempted anything useful, please let me know. I would greatly appreciate any assistance. It's worth noting that the app is obfuscated.

Author
Account Strength
40%
Account Age
9 months
Verified Email
Yes
Verified Flair
No
Total Karma
1
Link Karma
2
Comment Karma
n/a
Profile updated: 9 hours ago

Subreddit

Post Details

We try to extract some basic information from the post title. This is not always successful or accurate, please use your best judgement and compare these values to the post title and body for confirmation.
Posted
6 months ago